Skip to content

Commit

Permalink
Clarifying secret scanning conditions (#53661)
Browse files Browse the repository at this point in the history
Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com>
  • Loading branch information
andrekolodochka and mchammer01 authored Dec 17, 2024
1 parent 795c79c commit 1100881
Showing 1 changed file with 2 additions and 2 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -79,8 +79,8 @@ When using {% data variables.secret-scanning.copilot-secret-scanning %}'s {% dat
* {% data variables.secret-scanning.copilot-secret-scanning %} does not detect secrets in generated or vendored files.
* {% data variables.secret-scanning.copilot-secret-scanning %} does not detect secrets in encrypted files.
* {% data variables.secret-scanning.copilot-secret-scanning %} does not detect secrets in file types: SVG, PNG, JPEG, CSV, TXT, SQL, or ITEM.
* {% data variables.secret-scanning.copilot-secret-scanning %} does not detect secrets in test code. {% data variables.secret-scanning.copilot-secret-scanning %} skips detections where:
* The file path contains "test", "mock", or "spec".
* {% data variables.secret-scanning.copilot-secret-scanning %} does not detect secrets in test code. {% data variables.secret-scanning.copilot-secret-scanning %} skips detections when both conditions are met:
* The file path contains "test", "mock", or "spec", AND
* The file extension is `.cs`, `.go`, `.java`, `.js`, `.kt`, `.php`, `.py`, `.rb`, `.scala`, `.swift`, or `.ts`.

## Evaluation of {% data variables.secret-scanning.generic-secret-detection %}
Expand Down

0 comments on commit 1100881

Please sign in to comment.